Review Questions

1. In a multiple domain Windows NT environment, it was possible to have one-way trust relationships. In Windows 2000, by default, all trust relationships within a forest are termed:

A. One-way

B. Two-way

C. Either way or two-way

D. Transitive

2. Public key encryption depends on:

A. Two keys, one public and one private

B. Two keys, both public

C. Two keys, both private

D. One private key that is sent with the message

3. Smart card logon requires:

A. Nothing, it is included with Windows 2000

B. The use of third party solutions

C. An encrypted password

4. IPSec is which of the below:

A. The next generation of the Internet Protocol, otherwise referred to as IP Version 6

B. Used exclusively on proxy servers and Web servers

C. A suite of protocols that will allow for secure communications across an insecure network like the Internet

D. Still in development

5. Why is it necessary to have a Windows 2000 pilot before the rollout and implementation of a Windows 2000 enterprise network?

B. To get the bugs out of the rollout process

C. To test security before it is implemented

D. To make sure the last remaining bugs are out of the production release

6. Symmetrical encryption is another name for:

A. Kerberos 5

B. Secret key encryption

D. IPSec

7. When using EFS, an encrypted file can only opened by which of the following:

A. A system administrator

B. A system administrator with a recovery certificate

C. Anyone who has permissions to the directory the file is in

D. Anyone who has been given an explicit permission assignment to that file

E. The user who encrypted the file

8. Security Policies can be assigned to:

A.

Users

B.

Groups

C.

Systems

D.

Trees

E.

Sites

9. Somewhere on your network, there is a folder that contains all the information on the ultra-top-secret U200-X project. As you design your security, you spend extra time planning the permissions and access restrictions to this folder. You also make sure you know who may be attacking this folder and how they may try and get in. This is an example of:

A. Proper planning

B. Job protection

C. Public Key Infrastructure design

D. Kerberos 5 integration

E. Risk analysis

10. Your company has an enterprise network that serves users in 10 different locations. The chief information officer and the security administrators are housed at the corporate office. Each of the 10 locations has a staff of at least three administrators to handle the day-to-day operations of the local site. The infrastructure team is located in Chicago, while the ADS team is located in Michigan. This is an example of:

A. Centralized administration

B. Distributed administration based on location

C. Distributed administration based on specialty

D. A hybrid approach to distributed administration

Was this article helpful?

0 0

Post a comment